会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 31. 发明授权
    • Replay attack protection with small state for use in secure group communication
    • 以小状态重播攻击保护,用于安全群组通信
    • US08631491B2
    • 2014-01-14
    • US13429021
    • 2012-03-23
    • Sriram Nandha PremnathVladimir Kolesnikov
    • Sriram Nandha PremnathVladimir Kolesnikov
    • G06F21/00
    • H04L63/1466G06F21/606H04L63/0428
    • A replay detection technique with “small state” (e.g., with relatively few bits of state information). A sending node generates a random number ri, retrieves a code sequence (h*i−1), in one example, comprising the last 5 bits of a hash value (hi−1) of a previous packet i−1, generates a hash value hi based on the random number ri and the code sequence (h*i−1), and formulates a packet with index i including hi, ri and datai for delivery to a receiving node. The receiving node retrieves ri and hi from packet i; retrieves a code sequence (h*j) associated with a previous packet j, in one embodiment, comprising the last 5 bits of a hash value (hj) of a previous packet j, generates a hash value (hj+1) based on the random number ri and the code sequence (h*j); and declares a replay attack if hi does not equal hj+1.
    • 具有“小状态”(例如,具有相对较少的状态信息的位)的重放检测技术。 发送节点生成随机数ri,在一个示例中检索包含先前分组i-1的哈希值(hi-1)的最后5位的代码序列(h * i-1),生成哈希值 基于随机数ri和代码序列(h * i-1)的值hi,并且制定具有包括hi,ri和datai的索引i的分组以用于传送到接收节点。 接收节点从包i检索ri和hi; 在一个实施例中,检索与先前分组j相关联的代码序列(h * j),其包括先前分组j的哈希值(hj)的最后5位,基于该序列生成哈希值(hj + 1) 随机数ri和码序列(h * j); 并且如果hi不等于hj + 1,则声明重播攻击。
    • 32. 发明申请
    • Replay Attack Protection With Small State For Use In Secure Group Communication
    • 重复攻击保护与小状态用于安全组通信
    • US20130152195A1
    • 2013-06-13
    • US13429021
    • 2012-03-23
    • Sriram Nandha PremnathVladimir Kolesnikov
    • Sriram Nandha PremnathVladimir Kolesnikov
    • G06F21/00
    • H04L63/1466G06F21/606H04L63/0428
    • A replay detection technique with “small state” (e.g., with relatively few bits of state information). A sending node generates a random number ri, retrieves a code sequence (h*i-1), in one example, comprising the last 5 bits of a hash value (hi-1) of a previous packet i−1, generates a hash value hi based on the random number ri and the code sequence (h*i-1), and formulates a packet with index i including hi, ri and datai for delivery to a receiving node. The receiving node retrieves ri and hi from packet i; retrieves a code sequence (h*j) associated with a previous packet j, in one embodiment, comprising the last 5 bits of a hash value (hj) of a previous packet j, generates a hash value (hj+1) based on the random number ri and the code sequence (h*j); and declares a replay attack if hi does not equal hj+1.
    • 具有“小状态”(例如,具有相对较少的状态信息的位)的重放检测技术。 发送节点生成随机数ri,在一个示例中检索包含先前分组i-1的哈希值(hi-1)的最后5位的代码序列(h * i-1),生成哈希值 基于随机数ri和代码序列(h * i-1)的值hi,并且制定具有包括hi,ri和datai的索引i的分组以用于传送到接收节点。 接收节点从包i检索ri和hi; 在一个实施例中,检索与先前分组j相关联的代码序列(h * j),其包括先前分组j的哈希值(hj)的最后5位,基于该序列生成哈希值(hj + 1) 随机数ri和码序列(h * j); 并且如果hi不等于hj + 1,则声明重播攻击。
    • 33. 发明申请
    • METHOD AND APPARATUS FOR TWO-FACTOR KEY EXCHANGE PROTOCOL RESILIENT TO PASSWORD MISTYPING
    • 双因素交换协议对密码敏感的方法和设备
    • US20090287929A1
    • 2009-11-19
    • US12121315
    • 2008-05-15
    • Vladimir KolesnikovCharles Rackoff
    • Vladimir KolesnikovCharles Rackoff
    • H04L9/14
    • H04L9/0844H04L9/3231H04L2209/80
    • A system and method for two factor key exchange protocol resilient to password mistyping is disclosed. This authentication process is based on two factors including both electronically stored (long keys) and human supplied credentials (password or biometrics). The disclosed system and method ensures security in the presence of mistyping. The system includes receiving a message from a client signifying a request to establish a secure connection and sending a first random number to the client. The method continues with receiving a string and authorization code with parameters comprising the first random number and the string where the string includes an identifier, a short key and a second random number encrypted with a public key. The method continues with decrypting the string with a private key verifying the authentication code, verifying the short key and session key derivation by both server and client.
    • 公开了一种适用于密码失真的两因素密钥交换协议的系统和方法。 此认证过程基于两个因素,包括电子存储(长密钥)和人员提供的凭证(密码或生物特征)。 所公开的系统和方法确保在存在错误的情况下的安全性。 该系统包括从客户端接收表示建立安全连接的请求并向客户端发送第一随机数的消息。 该方法继续接收具有包括第一随机数和字符串的参数的字符串和授权码,其中字符串包括用公钥加密的标识符,短密钥和第二随机数。 该方法继续用验证验证码的私钥解密该字符串,验证服务器和客户机的短密钥和会话密钥导出。